A Cybersecurity Model for Electronic Governance and Open Society

作者: Nuno Lopes , José Faria

DOI: 10.1007/978-3-030-13283-5_8

关键词:

摘要: This paper starts by presenting the research landscape of vulnerabilities cyberspace; afterwards, it classifies cyber identified in literature; finally, proposes a cybersecurity model to tackle cyberspace found. The proposed is grounded three main pillars: governance approach, capabilities, and best practices. methodology used conduct this study based on quantitative qualitative analysis literature field. concludes that can be useful tool for preventing mitigating cyberattacks public private organizations.

参考文章(66)
Stephan Neuhaus, Bernhard Plattner, Software Security Economics: Theory, in Practice The Economics of Information Security and Privacy. pp. 75- 92 ,(2013) , 10.1007/978-3-642-39498-0_4
Victor Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen, Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops intelligence and security informatics. pp. 85- 90 ,(2015) , 10.1109/ISI.2015.7165944
Acklyn Murray, Geremew Begna, Ebelechukwu Nwafor, Jeremy Blackstone, Wayne Patterson, Cloud Service Security & application vulnerability southeastcon. pp. 1- 8 ,(2015) , 10.1109/SECON.2015.7132979
Gary McGraw, Silver Bullet Talks with Katie Moussouris ieee symposium on security and privacy. ,vol. 13, pp. 7- 9 ,(2015) , 10.1109/MSP.2015.89
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili, Defining and computing a value based cyber-security measure Information Systems and E-business Management. ,vol. 10, pp. 433- 453 ,(2011) , 10.1145/2107556.2107561
Jay-Evan J. Tevis, John A. Hamilton, Methods for the prevention, detection and removal of software security vulnerabilities Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42. pp. 197- 202 ,(2004) , 10.1145/986537.986583
Apostol Vassilev, Christopher Celi, Avoiding Cyberspace Catastrophes through Smarter Testing IEEE Computer. ,vol. 47, pp. 102- 106 ,(2014) , 10.1109/MC.2014.273
Dimitrios Zissis, Dimitrios Lekkas, Addressing cloud computing security issues Future Generation Computer Systems. ,vol. 28, pp. 583- 592 ,(2012) , 10.1016/J.FUTURE.2010.12.006